Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-20230

Опубликовано: 23 фев. 2021
Источник: ubuntu
Приоритет: medium
CVSS2: 5
CVSS3: 7.5

Описание

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

3:5.63-1ubuntu1
esm-apps/bionic

released

3:5.44-1ubuntu3+esm1
esm-apps/focal

released

3:5.56-1ubuntu0.2
esm-apps/jammy

not-affected

3:5.63-1build1
esm-apps/noble

not-affected

3:5.63-1ubuntu1
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

released

3:5.56-1ubuntu0.2
groovy

ignored

end of life

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 4 лет назад

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.5
nvd
больше 4 лет назад

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.5
debian
больше 4 лет назад

A flaw was found in stunnel before 5.57, where it improperly validates ...

suse-cvrf
больше 4 лет назад

Security update for stunnel

suse-cvrf
около 4 лет назад

Security update for stunnel

5 Medium

CVSS2

7.5 High

CVSS3